SlideShare a Scribd company logo
1 of 31
Download to read offline
Binary Frontier-guarded ASP with Function Symbols
Mantas Šimkus
Institute of Information Systems
Vienna University of Technology
simkus@dbai.tuwien.ac.at
RuleML 2015
Mantas Šimkus 1/27
1. Introduction
Outline
1 a brief introduction to Answer Set Programming
2 BFG programs (binary frontier-guarded programs)
• a new decidable class of programs with function symbols
3 encoding Description Logics into BFG programs
4 automata-based algorithm for BFG programs
Mantas Šimkus 2/27
2. Logic Programming
Logic Programs
A (disjunctive) logic program P is a (finite) set of rules of the form
a1 ∨ . . . ∨ al
head
← b1, . . . , bm, not c1, . . . , not cn
body
where all ak, bi, cj are atoms.
• if the body is empty, the rule is a fact
• if the head is empty, the rule is a constraint
The grounding of P is denoted Ground(P)
For a program P, HBP is the set of all atoms that can be built from
predicate names, constants and function symbols in P
An (Herbrand) interpretation for P is any set I ⊆ HBP
I is a model of P if I satisfies every rule in Ground(P)
Mantas Šimkus 3/27
2. Logic Programming
Answer Set Semantics (a.k.a. Stable Model Semantics)
Answer Set Semantics is a particular way to deal with “not”
Assume a program P and an interpretation I ⊆ HBP
The Gelfond-Lifschitz (GL) reduct PI is the program obtained from
Ground(P) by removing
1 every rule a1 ∨ . . . ∨ al ← b1, . . . , bm, not c1, . . . , not cn,
where some ci is in I, and
2 all literals not cj from the remaining rules
M is an answer set of P iff M is a minimal model of PM
Such an I satisfies all rules, and intuitively P justifies each atom in I
Mantas Šimkus 4/27
2. Logic Programming
Example (1)
P = { person(joey) ←;
male(X) ∨ female(X) ← person(X);
bachleor(X) ← male(X), not married(X);
M1 = {person(joey), male(joey), bachelor(joey)}
PM1 = { person(joey) ←;
male(joey) ∨ female(joey) ← person(joey);
bachleor(joey) ← male(joey); }
M1 is a minimal model of PM1 . Hence, M1 is a stable model of P.
Mantas Šimkus 5/27
2. Logic Programming
Example (2)
P = { person(joey) ←;
male(X) ∨ female(X) ← person(X);
bachleor(X) ← male(X), not married(X);
M2 = {person(joey), male(joey), married(joey)}
PM2 = { person(joey) ←;
male(joey) ∨ female(joey) ← person(joey);}
M2 is not a minimal model of PM2 . Hence M2 is not a stable model.
In general, no, one, or multiple stable models exist.
Mantas Šimkus 6/27
2. Logic Programming
Finite vs. Infinite Interpretations/Grounding
If P does not allow for function symbols, then HBP finite
• Decidability is easy: guess-and-check
In the presence of functions, HBP and Ground(P) infinite.
• We have to build minimal models for infinite programs
Mantas Šimkus 7/27
2. Logic Programming
Why function symbols?
Function symbols are desirable:
to model recursive data-structures,
temporal reasoning,
planning,
encoding DLs,
infinite objects, in general
Unrestricted use of function leads to high undecidability:
Finding a stable model is Σ1
1-complete [Marek and Remmel, 2001]
Mantas Šimkus 8/27
2. Logic Programming
Some Related Work
ASP with function symbols:
Finitely Recursive and Finitary programs [Baselice et al., 2007]
Finitely Ground programs [Calimeri et al., 2008]
Various acyclicity notions [Syrjänen, 2001][Gebser et al.,
2007][Calautti et al., 2014]
Open Answer Set Programming [Heymans et al., 2007]
FDNC programs and BD-programs by [Eiter and Šimkus, 2010]
Existential rules:
Datalog± [Calì et al., 2013][Gottlob et al., 2014]
Frontier-guarded rules [Baget et al., 2011]
Mantas Šimkus 9/27
3. BFG Programs
BFG Programs (Binary Frontier-guarded Programs)
BFG programs is a restricted class of programs with function symbols
High level description:
only unary and binary relations are allowed
only unary function symbols are allowed
3 shapes of unary atoms
4 shapes of binary atoms
rules are frontier-guarded
• a relaxation of standard (full)-guardedness
• not minor ; exponential blow-up in complexity
Mantas Šimkus 10/27
3. BFG Programs
BFG Programs (Binary Frontier-guarded Programs)
Definition
A program is called a BFG program if it satisfies the following conditions:
1) Only unary and binary relations are allowed
2) All ground rules are facts of the form A(c) ← and R(c, d) ←
3) Constant occur in facts only
4) The rules with variables have the following properties:
1 Binary atoms are of the form R(x, y), R(x, f(x)) or R(f(x), x);
2 Unary atoms are of the form A(x) or A(f(x));
3 (frontier-guardedness) If H is an atom in the head, then there is a
positive body atom that contains all the variables of H;
Note that rules are not guarded!
Mantas Šimkus 11/27
3. BFG Programs
Example Rules (1)
A(x) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z)
y2
y1
z
A B
x
not, Q
Q
R
R
Mantas Šimkus 12/27
3. BFG Programs
Example Rules (2)
R(x, f(x)) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z)
y2
y1
z
B
x
not, Q
Q
R
R
R, f
Mantas Šimkus 13/27
3. BFG Programs
Example Rules (3)
P(x, y2) ← R(x, g(y1)), R(y2, x), not Q(y1, z), Q(z, y2), B(z)
y2
y1
z
B
x
not, Q
Q
R, g
R
P
Mantas Šimkus 14/27
3. BFG Programs
Example Rules (4)
P(x, z) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z)
y2
y1
z
B
x
not, Q
Q
R
R
P
Mantas Šimkus 15/27
3. BFG Programs
Example Rules (4)
P(x, z) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z)
y2
y1
z
B
x
not, Q
Q
R
R
P
Disallowed! (not frontier-guarded)
Mantas Šimkus 15/27
3. BFG Programs
Example Program
A program P for generating 2-colored trees:
N(c) ←
N(f(x)) ← N(x)
N(g(x)) ← N(x)
E(x, f(x)) ← N(x)
E(x, g(x)) ← N(x)
E(x, y) ← E(y, x)
B(x) ∨ R(x) ← N(x)
g(c)
c
EE
E
N, B
EE E
N, R
f(c)
N, R
Mantas Šimkus 16/27
3. BFG Programs
Stable Models of BFG Programs
Forest models
Each binary atom in a stable model of a BFG program P has the form
R(c, d),
R(t, f(t)), or
R(f(t), t)
Proof (sketch)
Assume there is a stable model I of P violating the above property.
Remove from I all the binary atoms that are not of the form above.
Due to frontier-guardedness, the resulting interpretation J does not
violate any rule in PI, i.e. J is a model of PI. Contradiction.
Mantas Šimkus 17/27
3. BFG Programs
Stable Models of BFG Programs (Cnt’d)
If P has only one constant c, then each stable
model can be represented as a (labeled) tree:
the nodes are terms of the form
f1(f2(. . . fn(c) . . .))
terms f(t) are leaves of t
a term t may be labeled with some
unary predicates
an arc (t, f(t)) may be labeled with
binary predicates
g(c)
c
f(g(c))g(f(c))
f(c)
f(f(c))
A
Q
A
Q
Q
B
B B
RR
In general, stable models of BFG programs are forests.
Mantas Šimkus 18/27
4. Encoding Description Logics
Encoding Description Logics
Encoding knowledge bases of the Description Logic ALCHI:
A0 . . . An B0 . . . Bm B0(x) ∨ . . . ∨ Bm(x)←A0(x), . . ., An(x)
A ∃R.B R(f(x), x) ← A(x); B(f(x)) ← A(x)
A ∀R.B B(y) ← R(x, y), A(x)
R S S(x, y) ← R(x, y)
(c, d) : R R(c, d) ←
c : A A(c) ←
inverses R−
(x, y) ← R(y, x)
This translation uses a normal form & Herbrand’s theorem.
Translation preserves logical consequences.
Mantas Šimkus 19/27
5. Reasoning in BFG Programs
Reasoning in BFG Programs
All stable models of BFG are forest-shaped. Forests can also be
represented as labeled trees.
We can employ tree automata to reason about BFG programs:
• consistency testing (existence of a stable model),
Tree automata generalize the standard finite state automata (FSA).
Reasoning reduces to non-emptiness tests for tree automata.
There exist powerful automata models:
• e.g. alternating 2-way tree automata (2ATA) [Vardi, 1998]
run over infinite trees,
can move up and down in the tree,
allow for parallelization, and
can prohibit certain states from occurring infinitely often.
Mantas Šimkus 20/27
5. Reasoning in BFG Programs
Automata accepting interpretations
Some assumptions/notions/observations:
We fix a BFG program P
All interpretations for P (denoted I, I , J, . . .) are forests.
There is a representation of forest interpretations via labeled trees.
We say an automaton A1 accepts an interpretation I if A1 accepts
the corresponding labeled tree.
Mantas Šimkus 21/27
5. Reasoning in BFG Programs
Pairs of interpretations
A pair (I, I ) of interpretations can be represented in a single labeled
tree.
We say an automaton A2 accepts a pair (I, I ) if A2 accepts the
labeled tree that corresponds to (I, I ).
A2 ↓ is the projection automaton for A2:
• A2 ↓ accepts I iff there exists I such that A2 accepts (I, I )
Mantas Šimkus 22/27
5. Reasoning in BFG Programs
Counter-models
Generating Counter-examples
We can build an automaton Ace that accepts exactly the pairs (I, I )
such that I |= PI .
Intuitively,
1 First, Ace non-deterministically assigns variables of P to terms.
2 Then, Ace guesses a rule r ∈ P and
3 checks that under the variable assignment in (1), the following are
true:
• body+
(r) ⊆ I,
• body−
(r) ∩ I = ∅, and
• head(r) ∩ I = ∅.
Ace accepts the here-and-there interpretations that are not models of P.
Mantas Šimkus 23/27
5. Reasoning in BFG Programs
Generating Models
The complement Ace of Ace accepts pairs (I, I ) such that I |= PI .
We can build an automaton A= that accepts exactly the pairs (I, I )
such that I = I .
Then Ace ∩ A= accepts interpretations (I, I) such that I |= PI.
• or, total here-and-there models of P.
Let Amods = (Ace ∩ A=) ↓.
Amods accepts exactly the interpretations I such that I |= PI.
It remains to ensure minimality.
Mantas Šimkus 24/27
5. Reasoning in BFG Programs
Ensuring Minimality
We can build an automaton A that accepts exactly the pairs (I, I )
such that I I .
Let A1 = Ace ∩ A accepts interpretations (I, I ) such that I |= PI
and I I .
Let A2 = A1 ↓.
• A2 accepts I iff there exists I I such that I |= PI
.
Let Amin = A2.
Amin accepts exactly the interpretations I such that there exists
no J I with J |= PI.
Final result
Amods ∩ Amin accepts exactly the stable models of P.
Mantas Šimkus 25/27
5. Reasoning in BFG Programs
Complexity
Ace is a nondeterministic automaton with exponentially many states.
• The construction of Ace
is inspired by [Calvanese et al., 2007]
Complementation causes an exponential blowup in states.
The construction of Amods involves 1 complementation step.
The construction of Amin involves 2 complementation step.
Thus consistency of BFG programs is in 3ExpTime.
The problem is 2ExpTime-hard (due to [Lutz, 2007]).
Mantas Šimkus 26/27
6. Conclusion
Summary
We have defined BFG programs
• extremely simple syntax
• high expressivity
BFG programs capture many DLs and can extend them with
recursive rules
For future work:
• a 2ExpTime upper bound for BFG programs possible?
• to characterize the data complexity of BFG programs, i.e. the
complexity measured in the size of program facts.
• to investigate the possibility of rewriting BFG programs into ASP
programs without function symbols
Mantas Šimkus 27/27
7. References
Jean-François Baget, Michel Leclère, Marie-Laure Mugnier, and Eric Salvat.
On rules with existential variables: Walking the decidability line.
Artif. Intell., 175(9-10):1620–1654, 2011.
Sabrina Baselice, Piero A. Bonatti, and Giovanni Criscuolo.
On finitely recursive programs.
In Proceedings 23rd International Conference on Logic Programming (ICLP 2007),
volume 4670 of Lecture Notes in Computer Science, pages 89–103. Springer, 2007.
Marco Calautti, Sergio Greco, Cristian Molinaro, and Irina Trubitsyna.
Checking termination of logic programs with function symbols through linear constraints.
In Proc. of RuleML 2014, volume 8620 of Lecture Notes in Computer Science, pages
97–111. Springer, 2014.
Andrea Calì, Georg Gottlob, and Michael Kifer.
Taming the infinite chase: Query answering under expressive relational constraints.
J. Artif. Intell. Res. (JAIR), 48:115–174, 2013.
Francesco Calimeri, Susanna Cozza, Giovambattista Ianni, and Nicola Leone.
Computable functions in asp: Theory and implementation.
In Maria Garcia de la Banda and Enrico Pontelli, editors, ICLP, volume 5366 of Lecture
Notes in Computer Science, pages 407–424. Springer, 2008.
Diego Calvanese, Thomas Eiter, and Magdalena Ortiz.
Answering regular path queries in expressive description logics: An automata-theoretic
approach.
Mantas Šimkus 27/27
7. References
In Proc. of the 22nd Nat. Conf. on Artificial Intelligence (AAAI 2007), pages 391–396,
2007.
Martin Gebser, Torsten Schaub, and Sven Thiele.
GrinGo : A new grounder for answer set programming.
In Proc. LPNMR 2007, volume 4483 of LNCS, pages 266–271. Springer, 2007.
Georg Gottlob, André Hernich, Clemens Kupke, and Thomas Lukasiewicz.
Stable model semantics for guarded existential rules and description logics.
In Proc. of KR’14. AAAI Press, 2014.
Stijn Heymans, Davy Van Nieuwenborgh, and Dirk Vermeir.
Open answer set programming for the semantic web.
J. Applied Logic, 5(1):144–169, 2007.
Carsten Lutz.
Inverse roles make conjunctive queries hard.
In Proc. of the 2007 Description Logic Workshop (DL 2007), volume 250 of CEUR
Electronic Workshop Proceedings, http://ceur-ws.org/Vol-250/, pages 100–111,
2007.
V. Wiktor Marek and Jeffrey B. Remmel.
On the expressibility of stable logic programming.
In LPNMR, pages 107–120, 2001.
T. Syrjänen.
Omega-restricted logic programs.
Mantas Šimkus 27/27
7. References
In Proc. of the 6th Intl. Conference on Logic Programming and Nonmonotonic
Reasoning. Springer-Verlag, 2001.
Moshe Y. Vardi.
Reasoning about the past with two-way automata.
volume 1443 of Lecture Notes in Computer Science, pages 628–641. Springer, 1998.
Mantas Šimkus 27/27

More Related Content

What's hot

Scala: Pattern matching, Concepts and Implementations
Scala: Pattern matching, Concepts and ImplementationsScala: Pattern matching, Concepts and Implementations
Scala: Pattern matching, Concepts and ImplementationsMICHRAFY MUSTAFA
 
Hardness of approximation
Hardness of approximationHardness of approximation
Hardness of approximationcarlol
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysisIffat Anjum
 
Functions
FunctionsFunctions
FunctionsGaditek
 
Writing a SAT solver as a hobby project
Writing a SAT solver as a hobby projectWriting a SAT solver as a hobby project
Writing a SAT solver as a hobby projectMasahiro Sakai
 
Introduction to Max-SAT and Max-SAT Evaluation
Introduction to Max-SAT and Max-SAT EvaluationIntroduction to Max-SAT and Max-SAT Evaluation
Introduction to Max-SAT and Max-SAT EvaluationMasahiro Sakai
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Iffat Anjum
 
Cs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer keyCs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer keyappasami
 
Cs6660 compiler design may june 2017 answer key
Cs6660 compiler design may june 2017  answer keyCs6660 compiler design may june 2017  answer key
Cs6660 compiler design may june 2017 answer keyappasami
 
20110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-0420110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-04Computer Science Club
 
Cs6660 compiler design may june 2016 Answer Key
Cs6660 compiler design may june 2016 Answer KeyCs6660 compiler design may june 2016 Answer Key
Cs6660 compiler design may june 2016 Answer Keyappasami
 
Data Structures- Part5 recursion
Data Structures- Part5 recursionData Structures- Part5 recursion
Data Structures- Part5 recursionAbdullah Al-hazmy
 
COMPILER DESIGN AND CONSTRUCTION
COMPILER DESIGN AND CONSTRUCTIONCOMPILER DESIGN AND CONSTRUCTION
COMPILER DESIGN AND CONSTRUCTIONAnil Pokhrel
 
Sdd Syntax Descriptions
Sdd Syntax DescriptionsSdd Syntax Descriptions
Sdd Syntax Descriptionsgavhays
 

What's hot (20)

Scala: Pattern matching, Concepts and Implementations
Scala: Pattern matching, Concepts and ImplementationsScala: Pattern matching, Concepts and Implementations
Scala: Pattern matching, Concepts and Implementations
 
Hardness of approximation
Hardness of approximationHardness of approximation
Hardness of approximation
 
06. string matching
06. string matching06. string matching
06. string matching
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
 
Functions
FunctionsFunctions
Functions
 
Writing a SAT solver as a hobby project
Writing a SAT solver as a hobby projectWriting a SAT solver as a hobby project
Writing a SAT solver as a hobby project
 
Introduction to Max-SAT and Max-SAT Evaluation
Introduction to Max-SAT and Max-SAT EvaluationIntroduction to Max-SAT and Max-SAT Evaluation
Introduction to Max-SAT and Max-SAT Evaluation
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
 
Cs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer keyCs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer key
 
AI Lesson 16
AI Lesson 16AI Lesson 16
AI Lesson 16
 
Cs6660 compiler design may june 2017 answer key
Cs6660 compiler design may june 2017  answer keyCs6660 compiler design may june 2017  answer key
Cs6660 compiler design may june 2017 answer key
 
20110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-0420110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-04
 
Cis068 08
Cis068 08Cis068 08
Cis068 08
 
Lec17
Lec17Lec17
Lec17
 
Cs6660 compiler design may june 2016 Answer Key
Cs6660 compiler design may june 2016 Answer KeyCs6660 compiler design may june 2016 Answer Key
Cs6660 compiler design may june 2016 Answer Key
 
AI Lesson 13
AI Lesson 13AI Lesson 13
AI Lesson 13
 
AI Lesson 17
AI Lesson 17AI Lesson 17
AI Lesson 17
 
Data Structures- Part5 recursion
Data Structures- Part5 recursionData Structures- Part5 recursion
Data Structures- Part5 recursion
 
COMPILER DESIGN AND CONSTRUCTION
COMPILER DESIGN AND CONSTRUCTIONCOMPILER DESIGN AND CONSTRUCTION
COMPILER DESIGN AND CONSTRUCTION
 
Sdd Syntax Descriptions
Sdd Syntax DescriptionsSdd Syntax Descriptions
Sdd Syntax Descriptions
 

Viewers also liked

RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML
 
RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML
 
Combining Multimedia and Semantics (LACNEM2010)
Combining Multimedia and Semantics (LACNEM2010)Combining Multimedia and Semantics (LACNEM2010)
Combining Multimedia and Semantics (LACNEM2010)Oscar Corcho
 
RuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule EventsRuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule EventsRuleML
 
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML
 
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-RuleML
 
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML
 

Viewers also liked (7)

RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
RuleML2015 The Herbrand Manifesto - Thinking Inside the Box
 
RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?RuleML 2015 Constraint Handling Rules - What Else?
RuleML 2015 Constraint Handling Rules - What Else?
 
Combining Multimedia and Semantics (LACNEM2010)
Combining Multimedia and Semantics (LACNEM2010)Combining Multimedia and Semantics (LACNEM2010)
Combining Multimedia and Semantics (LACNEM2010)
 
RuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule EventsRuleML 2015: When Processes Rule Events
RuleML 2015: When Processes Rule Events
 
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth ContextRuleML 2015: Ontology Reasoning using Rules in an eHealth Context
RuleML 2015: Ontology Reasoning using Rules in an eHealth Context
 
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
Datalog+-Track Introduction & Reasoning on UML Class Diagrams via Datalog+-
 
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
RuleML 2015: Semantics of Notation3 Logic: A Solution for Implicit Quantifica...
 

Similar to Binary Frontier-guarded ASP Encoding of Description Logics

Accelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationAccelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationFeynman Liang
 
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...IJERA Editor
 
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...IJERA Editor
 
A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...
A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...
A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...iyo
 
Optimization of probabilistic argumentation with Markov processes
Optimization of probabilistic argumentation with Markov processesOptimization of probabilistic argumentation with Markov processes
Optimization of probabilistic argumentation with Markov processesEmmanuel Hadoux
 
The Concurrent Constraint Programming Research Programmes -- Redux (part2)
The Concurrent Constraint Programming Research Programmes -- Redux (part2)The Concurrent Constraint Programming Research Programmes -- Redux (part2)
The Concurrent Constraint Programming Research Programmes -- Redux (part2)Pierre Schaus
 
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)tanafuyu
 
Lec09- AI
Lec09- AILec09- AI
Lec09- AIdrmbalu
 
Colloquium presentation
Colloquium presentationColloquium presentation
Colloquium presentationbgeron
 
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...SSA KPI
 
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisDetecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisSilvio Cesare
 
Formal semantics for Cypher queries and updates
Formal semantics for Cypher queries and updatesFormal semantics for Cypher queries and updates
Formal semantics for Cypher queries and updatesopenCypher
 
Common fixed point theorems of integral type in menger pm spaces
Common fixed point theorems of integral type in menger pm spacesCommon fixed point theorems of integral type in menger pm spaces
Common fixed point theorems of integral type in menger pm spacesAlexander Decker
 

Similar to Binary Frontier-guarded ASP Encoding of Description Logics (20)

Lecture12 xing
Lecture12 xingLecture12 xing
Lecture12 xing
 
Accelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationAccelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference Compilation
 
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
 
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
Determination of Optimal Product Mix for Profit Maximization using Linear Pro...
 
A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...
A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...
A Study Of Statistical Models For Query Translation :Finding A Good Unit Of T...
 
Optimization of probabilistic argumentation with Markov processes
Optimization of probabilistic argumentation with Markov processesOptimization of probabilistic argumentation with Markov processes
Optimization of probabilistic argumentation with Markov processes
 
The Concurrent Constraint Programming Research Programmes -- Redux (part2)
The Concurrent Constraint Programming Research Programmes -- Redux (part2)The Concurrent Constraint Programming Research Programmes -- Redux (part2)
The Concurrent Constraint Programming Research Programmes -- Redux (part2)
 
MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...
MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...
MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...
 
Lecture15 xing
Lecture15 xingLecture15 xing
Lecture15 xing
 
2019 Fall Series: Postdoc Seminars - Special Guest Lecture, Attacking the Cur...
2019 Fall Series: Postdoc Seminars - Special Guest Lecture, Attacking the Cur...2019 Fall Series: Postdoc Seminars - Special Guest Lecture, Attacking the Cur...
2019 Fall Series: Postdoc Seminars - Special Guest Lecture, Attacking the Cur...
 
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
Quantum Minimax Theorem in Statistical Decision Theory (RIMS2014)
 
Lec09- AI
Lec09- AILec09- AI
Lec09- AI
 
Colloquium presentation
Colloquium presentationColloquium presentation
Colloquium presentation
 
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
Efficient Solution of Two-Stage Stochastic Linear Programs Using Interior Poi...
 
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
 
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow AnalysisDetecting Bugs in Binaries Using Decompilation and Data Flow Analysis
Detecting Bugs in Binaries Using Decompilation and Data Flow Analysis
 
Hmm and neural networks
Hmm and neural networksHmm and neural networks
Hmm and neural networks
 
Formal semantics for Cypher queries and updates
Formal semantics for Cypher queries and updatesFormal semantics for Cypher queries and updates
Formal semantics for Cypher queries and updates
 
Common fixed point theorems of integral type in menger pm spaces
Common fixed point theorems of integral type in menger pm spacesCommon fixed point theorems of integral type in menger pm spaces
Common fixed point theorems of integral type in menger pm spaces
 
Cd2 [autosaved]
Cd2 [autosaved]Cd2 [autosaved]
Cd2 [autosaved]
 

More from RuleML

Aggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsAggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsRuleML
 
A software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksA software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksRuleML
 
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...RuleML
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...RuleML
 
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRuleML
 
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML
 
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...RuleML
 
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...RuleML
 
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML
 
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML
 
RuleML2015: Compact representation of conditional probability for rule-based...
RuleML2015:  Compact representation of conditional probability for rule-based...RuleML2015:  Compact representation of conditional probability for rule-based...
RuleML2015: Compact representation of conditional probability for rule-based...RuleML
 
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML
 
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML
 
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...RuleML
 
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...RuleML
 
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...RuleML
 
Industry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraftIndustry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraftRuleML
 
Challenge@rule ml2015 rule based recommender systems for the Web of Data
Challenge@rule ml2015 rule based recommender systems for the Web of DataChallenge@rule ml2015 rule based recommender systems for the Web of Data
Challenge@rule ml2015 rule based recommender systems for the Web of DataRuleML
 
Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...
Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...
Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...RuleML
 

More from RuleML (20)

Aggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and SolutionsAggregates in Recursion: Issues and Solutions
Aggregates in Recursion: Issues and Solutions
 
A software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasksA software agent controlling 2 robot arms in co-operating concurrent tasks
A software agent controlling 2 robot arms in co-operating concurrent tasks
 
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
Port Clearance Rules in PSOA RuleML: From Controlled-English Regulation to Ob...
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
 
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive ConceptsRule Generalization Strategies in Incremental Learning of Disjunctive Concepts
Rule Generalization Strategies in Incremental Learning of Disjunctive Concepts
 
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and RulesRuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
RuleML2015 PSOA RuleML: Integrated Object-Relational Data and Rules
 
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
Industry@RuleML2015: Norwegian State of Estate A Reporting Service for the St...
 
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...A Service for Improving the Assignments of Common Agriculture Policy Funds to...
A Service for Improving the Assignments of Common Agriculture Policy Funds to...
 
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge PlatformsRuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
RuleML2015: API4KP Metamodel: A Meta-API for Heterogeneous Knowledge Platforms
 
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the BrowserRuleML2015: Rule-Based Exploration of Structured Data in the Browser
RuleML2015: Rule-Based Exploration of Structured Data in the Browser
 
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
RuleML2015: Ontology-Based Multidimensional Contexts with Applications to Qua...
 
RuleML2015: Compact representation of conditional probability for rule-based...
RuleML2015:  Compact representation of conditional probability for rule-based...RuleML2015:  Compact representation of conditional probability for rule-based...
RuleML2015: Compact representation of conditional probability for rule-based...
 
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information SystemsRuleML2015: Learning Characteristic Rules in Geographic Information Systems
RuleML2015: Learning Characteristic Rules in Geographic Information Systems
 
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
RuleML2015: Using Substitutive Itemset Mining Framework for Finding Synonymou...
 
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
RuleML2015: User Extensible System to Identify Problems in OWL Ontologies and...
 
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
RuleML2015: Representing Flexible Role-Based Access Control Policies Using Ob...
 
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
RuleML2015: Rule Generalization Strategies in Incremental Learning of Disjunc...
 
Industry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraftIndustry@RuleML2015 DataGraft
Industry@RuleML2015 DataGraft
 
Challenge@rule ml2015 rule based recommender systems for the Web of Data
Challenge@rule ml2015 rule based recommender systems for the Web of DataChallenge@rule ml2015 rule based recommender systems for the Web of Data
Challenge@rule ml2015 rule based recommender systems for the Web of Data
 
Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...
Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...
Challenge@RuleML2015 Modeling Object-Relational Geolocation Knowledge in PSOA...
 

Recently uploaded

Organic farming with special reference to vermiculture
Organic farming with special reference to vermicultureOrganic farming with special reference to vermiculture
Organic farming with special reference to vermicultureTakeleZike1
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024Jene van der Heide
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
ECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptx
ECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptxECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptx
ECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptxmaryFF1
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxuniversity
 
trihybrid cross , test cross chi squares
trihybrid cross , test cross chi squarestrihybrid cross , test cross chi squares
trihybrid cross , test cross chi squaresusmanzain586
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Quarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and FunctionsQuarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and FunctionsCharlene Llagas
 
bonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlsbonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlshansessene
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Ai in communication electronicss[1].pptx
Ai in communication electronicss[1].pptxAi in communication electronicss[1].pptx
Ai in communication electronicss[1].pptxsubscribeus100
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptJoemSTuliba
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxRitchAndruAgustin
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 

Recently uploaded (20)

Organic farming with special reference to vermiculture
Organic farming with special reference to vermicultureOrganic farming with special reference to vermiculture
Organic farming with special reference to vermiculture
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
ECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptx
ECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptxECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptx
ECG Graph Monitoring with AD8232 ECG Sensor & Arduino.pptx
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
 
trihybrid cross , test cross chi squares
trihybrid cross , test cross chi squarestrihybrid cross , test cross chi squares
trihybrid cross , test cross chi squares
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Quarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and FunctionsQuarter 4_Grade 8_Digestive System Structure and Functions
Quarter 4_Grade 8_Digestive System Structure and Functions
 
bonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlsbonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girls
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Ai in communication electronicss[1].pptx
Ai in communication electronicss[1].pptxAi in communication electronicss[1].pptx
Ai in communication electronicss[1].pptx
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.ppt
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 

Binary Frontier-guarded ASP Encoding of Description Logics

  • 1. Binary Frontier-guarded ASP with Function Symbols Mantas Šimkus Institute of Information Systems Vienna University of Technology simkus@dbai.tuwien.ac.at RuleML 2015 Mantas Šimkus 1/27
  • 2. 1. Introduction Outline 1 a brief introduction to Answer Set Programming 2 BFG programs (binary frontier-guarded programs) • a new decidable class of programs with function symbols 3 encoding Description Logics into BFG programs 4 automata-based algorithm for BFG programs Mantas Šimkus 2/27
  • 3. 2. Logic Programming Logic Programs A (disjunctive) logic program P is a (finite) set of rules of the form a1 ∨ . . . ∨ al head ← b1, . . . , bm, not c1, . . . , not cn body where all ak, bi, cj are atoms. • if the body is empty, the rule is a fact • if the head is empty, the rule is a constraint The grounding of P is denoted Ground(P) For a program P, HBP is the set of all atoms that can be built from predicate names, constants and function symbols in P An (Herbrand) interpretation for P is any set I ⊆ HBP I is a model of P if I satisfies every rule in Ground(P) Mantas Šimkus 3/27
  • 4. 2. Logic Programming Answer Set Semantics (a.k.a. Stable Model Semantics) Answer Set Semantics is a particular way to deal with “not” Assume a program P and an interpretation I ⊆ HBP The Gelfond-Lifschitz (GL) reduct PI is the program obtained from Ground(P) by removing 1 every rule a1 ∨ . . . ∨ al ← b1, . . . , bm, not c1, . . . , not cn, where some ci is in I, and 2 all literals not cj from the remaining rules M is an answer set of P iff M is a minimal model of PM Such an I satisfies all rules, and intuitively P justifies each atom in I Mantas Šimkus 4/27
  • 5. 2. Logic Programming Example (1) P = { person(joey) ←; male(X) ∨ female(X) ← person(X); bachleor(X) ← male(X), not married(X); M1 = {person(joey), male(joey), bachelor(joey)} PM1 = { person(joey) ←; male(joey) ∨ female(joey) ← person(joey); bachleor(joey) ← male(joey); } M1 is a minimal model of PM1 . Hence, M1 is a stable model of P. Mantas Šimkus 5/27
  • 6. 2. Logic Programming Example (2) P = { person(joey) ←; male(X) ∨ female(X) ← person(X); bachleor(X) ← male(X), not married(X); M2 = {person(joey), male(joey), married(joey)} PM2 = { person(joey) ←; male(joey) ∨ female(joey) ← person(joey);} M2 is not a minimal model of PM2 . Hence M2 is not a stable model. In general, no, one, or multiple stable models exist. Mantas Šimkus 6/27
  • 7. 2. Logic Programming Finite vs. Infinite Interpretations/Grounding If P does not allow for function symbols, then HBP finite • Decidability is easy: guess-and-check In the presence of functions, HBP and Ground(P) infinite. • We have to build minimal models for infinite programs Mantas Šimkus 7/27
  • 8. 2. Logic Programming Why function symbols? Function symbols are desirable: to model recursive data-structures, temporal reasoning, planning, encoding DLs, infinite objects, in general Unrestricted use of function leads to high undecidability: Finding a stable model is Σ1 1-complete [Marek and Remmel, 2001] Mantas Šimkus 8/27
  • 9. 2. Logic Programming Some Related Work ASP with function symbols: Finitely Recursive and Finitary programs [Baselice et al., 2007] Finitely Ground programs [Calimeri et al., 2008] Various acyclicity notions [Syrjänen, 2001][Gebser et al., 2007][Calautti et al., 2014] Open Answer Set Programming [Heymans et al., 2007] FDNC programs and BD-programs by [Eiter and Šimkus, 2010] Existential rules: Datalog± [Calì et al., 2013][Gottlob et al., 2014] Frontier-guarded rules [Baget et al., 2011] Mantas Šimkus 9/27
  • 10. 3. BFG Programs BFG Programs (Binary Frontier-guarded Programs) BFG programs is a restricted class of programs with function symbols High level description: only unary and binary relations are allowed only unary function symbols are allowed 3 shapes of unary atoms 4 shapes of binary atoms rules are frontier-guarded • a relaxation of standard (full)-guardedness • not minor ; exponential blow-up in complexity Mantas Šimkus 10/27
  • 11. 3. BFG Programs BFG Programs (Binary Frontier-guarded Programs) Definition A program is called a BFG program if it satisfies the following conditions: 1) Only unary and binary relations are allowed 2) All ground rules are facts of the form A(c) ← and R(c, d) ← 3) Constant occur in facts only 4) The rules with variables have the following properties: 1 Binary atoms are of the form R(x, y), R(x, f(x)) or R(f(x), x); 2 Unary atoms are of the form A(x) or A(f(x)); 3 (frontier-guardedness) If H is an atom in the head, then there is a positive body atom that contains all the variables of H; Note that rules are not guarded! Mantas Šimkus 11/27
  • 12. 3. BFG Programs Example Rules (1) A(x) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z) y2 y1 z A B x not, Q Q R R Mantas Šimkus 12/27
  • 13. 3. BFG Programs Example Rules (2) R(x, f(x)) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z) y2 y1 z B x not, Q Q R R R, f Mantas Šimkus 13/27
  • 14. 3. BFG Programs Example Rules (3) P(x, y2) ← R(x, g(y1)), R(y2, x), not Q(y1, z), Q(z, y2), B(z) y2 y1 z B x not, Q Q R, g R P Mantas Šimkus 14/27
  • 15. 3. BFG Programs Example Rules (4) P(x, z) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z) y2 y1 z B x not, Q Q R R P Mantas Šimkus 15/27
  • 16. 3. BFG Programs Example Rules (4) P(x, z) ← R(x, y1), R(y2, x), not Q(y1, z), Q(z, y2), B(z) y2 y1 z B x not, Q Q R R P Disallowed! (not frontier-guarded) Mantas Šimkus 15/27
  • 17. 3. BFG Programs Example Program A program P for generating 2-colored trees: N(c) ← N(f(x)) ← N(x) N(g(x)) ← N(x) E(x, f(x)) ← N(x) E(x, g(x)) ← N(x) E(x, y) ← E(y, x) B(x) ∨ R(x) ← N(x) g(c) c EE E N, B EE E N, R f(c) N, R Mantas Šimkus 16/27
  • 18. 3. BFG Programs Stable Models of BFG Programs Forest models Each binary atom in a stable model of a BFG program P has the form R(c, d), R(t, f(t)), or R(f(t), t) Proof (sketch) Assume there is a stable model I of P violating the above property. Remove from I all the binary atoms that are not of the form above. Due to frontier-guardedness, the resulting interpretation J does not violate any rule in PI, i.e. J is a model of PI. Contradiction. Mantas Šimkus 17/27
  • 19. 3. BFG Programs Stable Models of BFG Programs (Cnt’d) If P has only one constant c, then each stable model can be represented as a (labeled) tree: the nodes are terms of the form f1(f2(. . . fn(c) . . .)) terms f(t) are leaves of t a term t may be labeled with some unary predicates an arc (t, f(t)) may be labeled with binary predicates g(c) c f(g(c))g(f(c)) f(c) f(f(c)) A Q A Q Q B B B RR In general, stable models of BFG programs are forests. Mantas Šimkus 18/27
  • 20. 4. Encoding Description Logics Encoding Description Logics Encoding knowledge bases of the Description Logic ALCHI: A0 . . . An B0 . . . Bm B0(x) ∨ . . . ∨ Bm(x)←A0(x), . . ., An(x) A ∃R.B R(f(x), x) ← A(x); B(f(x)) ← A(x) A ∀R.B B(y) ← R(x, y), A(x) R S S(x, y) ← R(x, y) (c, d) : R R(c, d) ← c : A A(c) ← inverses R− (x, y) ← R(y, x) This translation uses a normal form & Herbrand’s theorem. Translation preserves logical consequences. Mantas Šimkus 19/27
  • 21. 5. Reasoning in BFG Programs Reasoning in BFG Programs All stable models of BFG are forest-shaped. Forests can also be represented as labeled trees. We can employ tree automata to reason about BFG programs: • consistency testing (existence of a stable model), Tree automata generalize the standard finite state automata (FSA). Reasoning reduces to non-emptiness tests for tree automata. There exist powerful automata models: • e.g. alternating 2-way tree automata (2ATA) [Vardi, 1998] run over infinite trees, can move up and down in the tree, allow for parallelization, and can prohibit certain states from occurring infinitely often. Mantas Šimkus 20/27
  • 22. 5. Reasoning in BFG Programs Automata accepting interpretations Some assumptions/notions/observations: We fix a BFG program P All interpretations for P (denoted I, I , J, . . .) are forests. There is a representation of forest interpretations via labeled trees. We say an automaton A1 accepts an interpretation I if A1 accepts the corresponding labeled tree. Mantas Šimkus 21/27
  • 23. 5. Reasoning in BFG Programs Pairs of interpretations A pair (I, I ) of interpretations can be represented in a single labeled tree. We say an automaton A2 accepts a pair (I, I ) if A2 accepts the labeled tree that corresponds to (I, I ). A2 ↓ is the projection automaton for A2: • A2 ↓ accepts I iff there exists I such that A2 accepts (I, I ) Mantas Šimkus 22/27
  • 24. 5. Reasoning in BFG Programs Counter-models Generating Counter-examples We can build an automaton Ace that accepts exactly the pairs (I, I ) such that I |= PI . Intuitively, 1 First, Ace non-deterministically assigns variables of P to terms. 2 Then, Ace guesses a rule r ∈ P and 3 checks that under the variable assignment in (1), the following are true: • body+ (r) ⊆ I, • body− (r) ∩ I = ∅, and • head(r) ∩ I = ∅. Ace accepts the here-and-there interpretations that are not models of P. Mantas Šimkus 23/27
  • 25. 5. Reasoning in BFG Programs Generating Models The complement Ace of Ace accepts pairs (I, I ) such that I |= PI . We can build an automaton A= that accepts exactly the pairs (I, I ) such that I = I . Then Ace ∩ A= accepts interpretations (I, I) such that I |= PI. • or, total here-and-there models of P. Let Amods = (Ace ∩ A=) ↓. Amods accepts exactly the interpretations I such that I |= PI. It remains to ensure minimality. Mantas Šimkus 24/27
  • 26. 5. Reasoning in BFG Programs Ensuring Minimality We can build an automaton A that accepts exactly the pairs (I, I ) such that I I . Let A1 = Ace ∩ A accepts interpretations (I, I ) such that I |= PI and I I . Let A2 = A1 ↓. • A2 accepts I iff there exists I I such that I |= PI . Let Amin = A2. Amin accepts exactly the interpretations I such that there exists no J I with J |= PI. Final result Amods ∩ Amin accepts exactly the stable models of P. Mantas Šimkus 25/27
  • 27. 5. Reasoning in BFG Programs Complexity Ace is a nondeterministic automaton with exponentially many states. • The construction of Ace is inspired by [Calvanese et al., 2007] Complementation causes an exponential blowup in states. The construction of Amods involves 1 complementation step. The construction of Amin involves 2 complementation step. Thus consistency of BFG programs is in 3ExpTime. The problem is 2ExpTime-hard (due to [Lutz, 2007]). Mantas Šimkus 26/27
  • 28. 6. Conclusion Summary We have defined BFG programs • extremely simple syntax • high expressivity BFG programs capture many DLs and can extend them with recursive rules For future work: • a 2ExpTime upper bound for BFG programs possible? • to characterize the data complexity of BFG programs, i.e. the complexity measured in the size of program facts. • to investigate the possibility of rewriting BFG programs into ASP programs without function symbols Mantas Šimkus 27/27
  • 29. 7. References Jean-François Baget, Michel Leclère, Marie-Laure Mugnier, and Eric Salvat. On rules with existential variables: Walking the decidability line. Artif. Intell., 175(9-10):1620–1654, 2011. Sabrina Baselice, Piero A. Bonatti, and Giovanni Criscuolo. On finitely recursive programs. In Proceedings 23rd International Conference on Logic Programming (ICLP 2007), volume 4670 of Lecture Notes in Computer Science, pages 89–103. Springer, 2007. Marco Calautti, Sergio Greco, Cristian Molinaro, and Irina Trubitsyna. Checking termination of logic programs with function symbols through linear constraints. In Proc. of RuleML 2014, volume 8620 of Lecture Notes in Computer Science, pages 97–111. Springer, 2014. Andrea Calì, Georg Gottlob, and Michael Kifer. Taming the infinite chase: Query answering under expressive relational constraints. J. Artif. Intell. Res. (JAIR), 48:115–174, 2013. Francesco Calimeri, Susanna Cozza, Giovambattista Ianni, and Nicola Leone. Computable functions in asp: Theory and implementation. In Maria Garcia de la Banda and Enrico Pontelli, editors, ICLP, volume 5366 of Lecture Notes in Computer Science, pages 407–424. Springer, 2008. Diego Calvanese, Thomas Eiter, and Magdalena Ortiz. Answering regular path queries in expressive description logics: An automata-theoretic approach. Mantas Šimkus 27/27
  • 30. 7. References In Proc. of the 22nd Nat. Conf. on Artificial Intelligence (AAAI 2007), pages 391–396, 2007. Martin Gebser, Torsten Schaub, and Sven Thiele. GrinGo : A new grounder for answer set programming. In Proc. LPNMR 2007, volume 4483 of LNCS, pages 266–271. Springer, 2007. Georg Gottlob, André Hernich, Clemens Kupke, and Thomas Lukasiewicz. Stable model semantics for guarded existential rules and description logics. In Proc. of KR’14. AAAI Press, 2014. Stijn Heymans, Davy Van Nieuwenborgh, and Dirk Vermeir. Open answer set programming for the semantic web. J. Applied Logic, 5(1):144–169, 2007. Carsten Lutz. Inverse roles make conjunctive queries hard. In Proc. of the 2007 Description Logic Workshop (DL 2007), volume 250 of CEUR Electronic Workshop Proceedings, http://ceur-ws.org/Vol-250/, pages 100–111, 2007. V. Wiktor Marek and Jeffrey B. Remmel. On the expressibility of stable logic programming. In LPNMR, pages 107–120, 2001. T. Syrjänen. Omega-restricted logic programs. Mantas Šimkus 27/27
  • 31. 7. References In Proc. of the 6th Intl. Conference on Logic Programming and Nonmonotonic Reasoning. Springer-Verlag, 2001. Moshe Y. Vardi. Reasoning about the past with two-way automata. volume 1443 of Lecture Notes in Computer Science, pages 628–641. Springer, 1998. Mantas Šimkus 27/27